h.264 video watermarking: applications, principles ......h.264 video watermarking - marc chaumont -...

75
HAL Id: lirmm-00577950 https://hal-lirmm.ccsd.cnrs.fr/lirmm-00577950 Submitted on 17 Mar 2011 HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci- entific research documents, whether they are pub- lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés. H.264 Video Watermarking: Applications, Principles, Deadlocks, and Future Marc Chaumont To cite this version: Marc Chaumont. H.264 Video Watermarking: Applications, Principles, Deadlocks, and Future. IPTA: Image Processing Theory, Tools and Applications, Jul 2010, Paris, France. lirmm-00577950

Upload: others

Post on 20-Oct-2020

18 views

Category:

Documents


0 download

TRANSCRIPT

  • HAL Id: lirmm-00577950https://hal-lirmm.ccsd.cnrs.fr/lirmm-00577950

    Submitted on 17 Mar 2011

    HAL is a multi-disciplinary open accessarchive for the deposit and dissemination of sci-entific research documents, whether they are pub-lished or not. The documents may come fromteaching and research institutions in France orabroad, or from public or private research centers.

    L’archive ouverte pluridisciplinaire HAL, estdestinée au dépôt et à la diffusion de documentsscientifiques de niveau recherche, publiés ou non,émanant des établissements d’enseignement et derecherche français ou étrangers, des laboratoirespublics ou privés.

    H.264 Video Watermarking: Applications, Principles,Deadlocks, and Future

    Marc Chaumont

    To cite this version:Marc Chaumont. H.264 Video Watermarking: Applications, Principles, Deadlocks, and Future. IPTA:Image Processing Theory, Tools and Applications, Jul 2010, Paris, France. �lirmm-00577950�

    https://hal-lirmm.ccsd.cnrs.fr/lirmm-00577950https://hal.archives-ouvertes.fr

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    H.264 video watermarking:applications, principles, deadlocks, and future

    Marc Chaumont

    July 17, 2010

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Preamble

    Outline

    1 Preamble

    2 H.264

    3 WatermarkingDefinitionsVideo watermarkingSecurity of video watermarkingA practical example: the traitor tracing (active fingerprinting)

    4 Conclusion & Perspectives

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Preamble

    PARIS

    MONTPELLIER

    Slides may be downloaded at http:/ /www.lirmm.fr/ ~chaumont/Publications.htmle‐mail : [email protected]

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Preamble

    Where video compression is hidden in every days life?

    A word of video compression

    Camera (Video surveillance, Smart Phone, ...),

    Streaming (YouTube, Television, ...),

    Storing (DVD, Blue-Ray, Hard-Disk, ...),

    Editing (Cinema, advertisement, entertainment).

    → Lots of people use videos.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Preamble

    There is a need for good compression algorithms

    There is more and more video contents but:

    network bandwitch is limited,

    storing devices memories are limited.

    Example:

    SDTV (images 720x576, 25 fps, 90 min. of movie):

    Rate without compression: 237 Mbits/s,

    ADSL in France ≈ 30€/month for 20 Mbits/s.

    Storing capacity without compression: 1,22 Tera-bits,

    Storing capacity for a DVD: 4,7 GB.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Preamble

    Standardization - codecs evolution

    Figure: 25 years of video compression standards

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Preamble

    And where is the money?

    People making money with video contents :

    Producers,

    Distributors (Hollywood...),

    Cinema operators,

    Technology providers (Internet providers, Reading and Record-ing devices constructors).

    Those lobbys are dynamic in standardization committees and/or wa-termarking.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Preamble

    A part of this money is used for protection

    The problem for right owners is the pirates...

    Scientists should find solutions in order to dissuade users from pi-rating

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Preamble

    Many solutions for security

    Possible solutions:

    cryptography→ flaws due to reverse engineering.securize all the channel from reader to displayerExample : Blue-Ray reader + HD TV + HDMI wire→ Blue-Ray DVDs have already been pirated.spy the network and collect pirate IPs→ it may dissuade casual user.propose cheap movies renting→ it may dissuade casual user....

    watermarking→ ...

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Preamble

    What about watermarking?

    Applications using watermarking:

    Related to security Related to media enhancementcopyright identification broadcast monitoringtraitor tracing (active fingerprinting) device controlauthentication enrichment (functionalities and/or meta-datas)copy control with forward compatibility

    improve compression performancesimprove error recovery & correction

    In most of these applications, the watermarking should be robust.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    H.264

    Outline

    1 Preamble

    2 H.264

    3 WatermarkingDefinitionsVideo watermarkingSecurity of video watermarkingA practical example: the traitor tracing (active fingerprinting)

    4 Conclusion & Perspectives

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    H.264

    What is H.264/AVC?

    H.264 or MPEG-4 Part 10:

    State-of-the-art video coding standard,

    First version approved in 2003,

    Normalized by ITU-T and ISO/IEC organizations,

    Up to 50% in bit rate savings comparedto MPEG-2 and MPEG4 Part 2 simple profile.

    “Draft ITU-T Recommendation and Final Draft International Standard of Joint Video Specification (ITU-T Rec.

    H.264 ISO/IEC 14496-10 AVC),” Tech. Rep., Joint Video Team (JVT), Doc. JVT-G050, March 2003.

    I. Richardson, “H.264 and MPEG-4 Video Compression: Video Coding for Next-Generation Multimedia”, 2003.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    H.264

    Visual example...

    H.264 100Kbs MPEG2 100Kbs

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    H.264

    General coding scheme

    Integer

    TransformationQuantization Entropy

    coding

    INTRA or INTER

    prediction

    Macroblock

    16x16

    +-

    residue

    motion data

    control data

    0010101001

    bitstream

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    H.264

    General coding scheme

    Integer

    TransformationQuantization Entropy

    coding

    INTRA or INTER

    prediction

    Macroblock

    16x16

    +-

    residue

    motion data

    control data

    0010101001

    bitstream

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    H.264

    Intra prediction modes

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    H.264

    General coding scheme

    Integer

    TransformationQuantization Entropy

    coding

    INTRA or INTER

    prediction

    Macroblock

    16x16

    +-

    residue

    motion data

    control data

    0010101001

    bitstream

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    H.264

    Inter prediction - Motion Estimation

    Figure: Motion estimation in temporal direction.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    H.264

    Inter prediction - Motion Vectors

    Figure: Motion vectors.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    H.264

    General coding scheme

    Integer

    TransformationQuantization Entropy

    coding

    INTRA or INTER

    prediction

    Macroblock

    16x16

    +-

    residue

    motion data

    control data

    0010101001

    bitstream

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    H.264

    General coding scheme

    Integer

    TransformationQuantization Entropy

    coding

    INTRA or INTER

    prediction

    Macroblock

    16x16

    +-

    residue

    motion data

    control data

    0010101001

    bitstream

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    H.264

    General coding scheme

    Integer

    TransformationQuantization Entropy

    coding

    INTRA or INTER

    prediction

    Macroblock

    16x16

    +-

    residue

    motion data

    control data

    0010101001

    bitstream

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Outline

    1 Preamble

    2 H.264

    3 WatermarkingDefinitionsVideo watermarkingSecurity of video watermarkingA practical example: the traitor tracing (active fingerprinting)

    4 Conclusion & Perspectives

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Definitions

    Outline

    1 Preamble

    2 H.264

    3 WatermarkingDefinitionsVideo watermarkingSecurity of video watermarkingA practical example: the traitor tracing (active fingerprinting)

    4 Conclusion & Perspectives

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Definitions

    Recall: applications

    Applications using watermarking:

    Related to security Related to media enhancementcopyright identification broadcast monitoringtraitor tracing (active fingerprinting) device controlauthentication enrichment (functionalities and/or meta-datas)copy control with forward compatibility

    improve compression performancesimrove error recovery & correction

    In most of these applications, the watermarking should be robust.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Definitions

    What is robust watermarking?

    The robust watermarking is the art of modifying a media (image,sound, video, ...) such that:

    it contains a message most of the time in relation with themedia,

    degradation is most of the time imperceptible,

    the hidden message is not lost when media degradation occurs(attacks).

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Definitions

    Robustness illustration

    original watermarked

    ”Broken Arrows”, Teddy Furon and Patrick Bas, EURASIP Journal on Information Security, 2008.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Definitions

    Robustness illustration(1): detection = Ok

    watermarked additive noise

    ”Broken Arrows”, Teddy Furon and Patrick Bas, EURASIP Journal on Information Security, 2008.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Definitions

    Robustness illustration(2): detection = Ok

    watermarked blur

    ”Broken Arrows”, Teddy Furon and Patrick Bas, EURASIP Journal on Information Security, 2008.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Definitions

    Robustness illustration(3): detection = Ok

    watermarked luminosity upscaling

    ”Broken Arrows”, Teddy Furon and Patrick Bas, EURASIP Journal on Information Security, 2008.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Definitions

    Robustness illustration(4): detection = Ok

    watermarked luminosity downscaling

    ”Broken Arrows”, Teddy Furon and Patrick Bas, EURASIP Journal on Information Security, 2008.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Definitions

    Robustness illustration(5): detection = Ok

    watermarked sharp amplification

    ”Broken Arrows”, Teddy Furon and Patrick Bas, EURASIP Journal on Information Security, 2008.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Definitions

    Desynchronization attack detection = NOT Ok

    watermarked rotated, cropped, and resized

    ”Broken Arrows”, Teddy Furon and Patrick Bas, EURASIP Journal on Information Security, 2008.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Definitions

    Few non-malicious attacks for a video

    Non-malicious attacks:Photometric Noise addition, DA/AD conversion

    Gamma correctionTranscoding and video format conversionIntra and inter-frames filteringChrominance resampling (4:4:4, 4:2:2, 4:2:0)

    Spatial Desynchronization Changes display formats (4/3, 16/9, 2.11/1)Changes resolution (NTSC, PAL, SECAM)Positional jitterHand-held camera recording (curved-bilinear transform)

    Temporal Desynchronization Changes of frame rateFrame dropping / insertionFrame decimation / duplication

    Video editing Cut-and-splice and cut-insert-spliceFade-and-dissolve and wipe-and-matteGraphic overlay (subtitles, logo)

    “Security issue and collusion attacks in video watermarking”, PhD Thesis, G. Doërr, Supervised by J.-L. Dugelay,

    University of Nice-Sophia Antipolis, France, june 2005.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Definitions

    Robust watermarking families

    The three major families (multi-bits):Not informed : Spread Spectrum (DM-SS),Informed : Quantized-based (QIM, SCS, P-QIM),Informed : Trellis-based (DPTC).

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Definitions

    Informed embedding scheme

    Input message

    Informedcoding

    Watermark embedder

    Watermark key Original cover Work

    w

    x

    ym001110011001...

    Informedembeddingc*

    Watermarkedimage

    Figure: Informed embedding.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Definitions

    Informed extracting scheme

    y

    Noise

    Watermarkdecoder

    Watermark extractor

    mnz

    Watermark key

    Output message

    Watermarkedimage

    Figure: Blind extraction.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Video watermarking

    Outline

    1 Preamble

    2 H.264

    3 WatermarkingDefinitionsVideo watermarkingSecurity of video watermarkingA practical example: the traitor tracing (active fingerprinting)

    4 Conclusion & Perspectives

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Video watermarking

    Major approaches

    images

    sequence

    of images

    Inside H.264 structure

    Before quantization During Entropy coding

    Luma modification:

    [Golikeri et al., JEI’ヲヰヰΒ]

    Motion vectors modification:

    [Zhaミg et al., SCGIP’ヲヰヰヱ]

    GOP structure modification:

    [Linnartz and Talstra, ESRCS’ヱΓΓΒ]

    [Mobasseri aミd Raikar, SPIE’ヲヰヰΑ][Zou aミd Blooマ, SPIE’ヲヰヰΓ]…

    Before

    compression

    During encoding

    process

    [Shahid et al.,

    EUSIPCO’ヲヰヰΓ][Noorkami and Mersereau,

    TIFS’ヲヰヰΒ]…

    In an already

    H.264 encoded

    bitstream

    After quantization

    [Hartung and Girod,

    Signal Processing 1998]

    [Gong and Lu, ISM'2008]

    SS [Cox et al., TIP’ヱΓΓΑ]DPTC [Miller et al., TIP’ヲヰヰ4]P-QIM [Li aミd Cox, TIFS’ヲヰヰΑ]…

    Temporal watermarking

    [Haitsma aミd Kalker,ICIP’ヲヰヰヱ][Chen et al., IWDW'2009]

    3D DFT

    [Deguillaume et al., SPIE’ヱΓΓΓ]

    On-off keying (Extended BA)

    [Xie et al., MM&Sec2008]

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Video watermarking

    Chosen schemes

    images

    sequence

    of images

    Inside H.264 structure

    Before quantization During Entropy coding

    Luma modification:

    [Golikeri et al., JEI’ヲヰヰΒ]

    Motion vectors modification:

    [Zhaミg et al., SCGIP’ヲヰヰヱ]

    GOP structure modification:

    [Linnartz and Talstra, ESRCS’ヱΓΓΒ]

    [Mobasseri aミd Raikar, SPIE’ヲヰヰΑ][Zou aミd Blooマ, SPIE’ヲヰヰΓ]…

    Before

    compression

    During encoding

    process

    [Shahid et al.,

    EUSIPCO’ヲヰヰΓ][Noorkami and Mersereau,

    TIFS’ヲヰヰΒ]…

    In an already

    H.264 encoded

    bitstream

    After quantization

    [Hartung and Girod,

    Signal Processing 1998]

    [Gong and Lu, ISM'2008]

    SS [Cox et al., TIP’ヱΓΓΑ]DPTC [Miller et al., TIP’ヲヰヰ4]P-QIM [Li aミd Cox, TIFS’ヲヰヰΑ]…

    Temporal watermarking

    [Haitsma aミd Kalker,ICIP’ヲヰヰヱ][Chen et al., IWDW'2009]

    3D DFT

    [Deguillaume et al., SPIE’ヱΓΓΓ]

    On-off keying (Extended BA)

    [Xie et al., MM&Sec2008]

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Video watermarking

    Chosen schemes

    images

    sequence

    of images

    Inside H.264 structure

    Before quantization During Entropy coding

    Luma modification:

    [Golikeri et al., JEI’ヲヰヰΒ]

    Motion vectors modification:

    [Zhaミg et al., SCGIP’ヲヰヰヱ]

    GOP structure modification:

    [Linnartz and Talstra, ESRCS’ヱΓΓΒ]

    [Mobasseri aミd Raikar, SPIE’ヲヰヰΑ][Zou aミd Blooマ, SPIE’ヲヰヰΓ]…

    Before

    compression

    During encoding

    process

    [Shahid et al.,

    EUSIPCO’ヲヰヰΓ][Noorkami and Mersereau,

    TIFS’ヲヰヰΒ]…

    In an already

    H.264 encoded

    bitstream

    After quantization

    [Hartung and Girod,

    Signal Processing 1998]

    [Gong and Lu, ISM'2008]

    SS [Cox et al., TIP’ヱΓΓΑ]DPTC [Miller et al., TIP’ヲヰヰ4]P-QIM [Li aミd Cox, TIFS’ヲヰヰΑ]…

    Temporal watermarking

    [Haitsma aミd Kalker,ICIP’ヲヰヰヱ][Chen et al., IWDW'2009]

    3D DFT

    [Deguillaume et al., SPIE’ヱΓΓΓ]

    On-off keying (Extended BA)

    [Xie et al., MM&Sec2008]

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Video watermarking

    Before quantization

    IntegerTransformation

    Quantization Entropy coding

    INTRA or INTERprediction

    Macroblock 16x16

    +‐

    residue

    motion data

    control data

    0010101001bitstream

    [Golikeri et al., Journal of Electronic Imaging 2007]

    A. Golikeri, P. Nasiopoulos, and Z. Wang, “Robust Digital Video Watermarking Scheme for H.264 Advanced Video

    Coding Standard,” Journal of Electronic Imaging 16(4), 2007.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Video watermarking

    Golikeri et al. scheme

    Embed 1 bit in 1 macro-block,

    Use of a perceptual mask,

    Quantization-based watermarking (ST-SCS),

    Step size ∆ and strength α parameters tune depending on the H.264 quantization.

    Imperceptible√

    Photometric robustness√

    (should reduce payload)

    Video bitrate weakly modified√

    respect ’quiet well’ RD constraints

    No Drift√

    Real-time√

    Not robust to desynchronisation or temporal attacks.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Video watermarking

    After quantization

    IntegerTransformation

    Quantization Entropy coding

    INTRA or INTERprediction

    Macroblock 16x16

    +‐

    residue

    motion data

    control data

    0010101001bitstream

    [Shahid et al. EUSIPCO'2009]

    Z. Shahid, P. Meuel, M. Chaumont and W. Puech, “Considering the Reconstruction Loop for Watermarking of

    Intra and Inter Frames of H.264/AVC”, EUSIPCO’2009, The 17th European Signal Processing Conference, Glasgow,

    Scotland, 24-28 August, 2009 (an extended version has been submitted to Journal of Electronic Imaging 2010).

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Video watermarking

    Shahid et al. scheme

    Modify LSB (1, 2 or 1&2) of non-zero ACs quantized coefficientswhose magnitude are greater or equals to 2,

    Inter and Intra,

    RD optimization mode selection achieved on all prediction modes.

    Imperceptible√

    Photometric robustness NO

    Video bitrate weakly modified√

    No Drift√

    Real-time√

    Not robust to desynchronisation or temporal attacks.Note: In [Noorkami and Mersereau, TIFS’2008], robust 0-bit watermarking, psychovisual masking, embedding in

    ACs coefficients and detection without knowing exact location of watermarked coefficients.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Video watermarking

    During entropy coding (codeword substitution)

    IntegerTransformation

    Quantization Entropy coding

    INTRA or INTERprediction

    Macroblock 16x16

    +‐

    residue

    motion data

    control data

    0010101001bitstream

    [Mobasseri and Raikar, SPIE'2007]

    B.G. Mobasseri and Y.N. Raikar. “Authentication of H.264 Streams by Direct Watermarking of CAVLC Blocks”.

    In Security, Steganography, and Watermarking of Multimedia Contents IX, SPIE’2007.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Video watermarking

    Mobasseri and Raikar scheme

    The algorithm creates ”exceptions” in H.264 code space (portionof CAVLC) that only the decoder understands while keeping thebitstream syntax compliant.

    Imperceptible√

    Photometric robustness NO

    Video bitrate weakly modified√

    (file size unchanged)

    No Drift√

    Real-time√

    Watermark can be removed but cannot be forged or replaced.Not robust to desynchronisation or temporal attacks.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Video watermarking

    Brief conclusion

    Good news

    There are good solutions robust to photometric attacks INSIDEH.264 (or a similar codec).

    Bad news

    Most of the solutions (all?) INSIDE H.264 (or a similar codec)are not robust (or not enough robust) to temporal and spatialdesynchronizations.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Video watermarking

    Major approaches

    images

    sequence

    of images

    Inside H.264 structure

    Before quantization During Entropy coding

    Luma modification:

    [Golikeri et al., JEI’ヲヰヰΒ]

    Motion vectors modification:

    [Zhaミg et al., SCGIP’ヲヰヰヱ]

    GOP structure modification:

    [Linnartz and Talstra, ESRCS’ヱΓΓΒ]

    [Mobasseri aミd Raikar, SPIE’ヲヰヰΑ][Zou aミd Blooマ, SPIE’ヲヰヰΓ]…

    Before

    compression

    During encoding

    process

    [Shahid et al.,

    EUSIPCO’ヲヰヰΓ][Noorkami and Mersereau,

    TIFS’ヲヰヰΒ]…

    In an already

    H.264 encoded

    bitstream

    After quantization

    [Hartung and Girod,

    Signal Processing 1998]

    [Gong and Lu, ISM'2008]

    SS [Cox et al., TIP’ヱΓΓΑ]DPTC [Miller et al., TIP’ヲヰヰ4]P-QIM [Li aミd Cox, TIFS’ヲヰヰΑ]…

    Temporal watermarking

    [Haitsma aミd Kalker,ICIP’ヲヰヰヱ][Chen et al., IWDW'2009]

    3D DFT

    [Deguillaume et al., SPIE’ヱΓΓΓ]

    On-off keying (Extended BA)

    [Xie et al., MM&Sec2008]

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Video watermarking

    Brief conclusion

    Good news

    There are good solutions robust to photometric attacks INSIDEH.264 (or a similar codec).

    Bad news

    Most of the solutions (all?) INSIDE H.264 (or a similar codec)are not robust (or not enough robust) to temporal and spatialdesynchronizations.

    → What about security?

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Security of video watermarking

    Outline

    1 Preamble

    2 H.264

    3 WatermarkingDefinitionsVideo watermarkingSecurity of video watermarkingA practical example: the traitor tracing (active fingerprinting)

    4 Conclusion & Perspectives

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Security of video watermarking

    Definition

    The classical framework of security:

    Kerckhoffs’s framework

    The embedding and extracting algorithms are known by the attackerand the attacker owns observations. The only secret parameter isthe key.

    Security attack

    A security attack is an attack for which secrets parameters or secretinformations are obtained.

    Security subject addresses those technical points:

    Analysis and creation of secure algorithm,

    Analysis and creation of security attack.

    F. Cayre, C. Fontaine, T. Furon, “Watermarking Security: Theory and Practice”, IEEE Transactions on Signal

    Processing, vol. 53, no. 10, pp. 3976-3987, 2005.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Security of video watermarking

    Security of few images schemes

    Security addresses the problem of recovering secret parameters.Images Proposed attacks

    Spread Spectrum “Comparison of secure spread-spectrum modulations applied to still imagewatermarking” B. Mathon, P. Bas P, F. Cayre F, and B. Macq.

    Annals of Telecommunication, 2009.

    Broken Arrows “Two Key Estimation Techniques for the Broken-Arrows Watermarking Scheme”,P. Bas and A. Westfeld, MM&Sec’2009.

    Counter Attack : “Better security levels for ‘Broken Arrows’ ”,

    F. Xie, T. Furon, and C. Fontaine, SPIE’2010.

    DPTC “Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper TrellisSchemes”.P Bas and G. Doërr, MM&Sec’2008.

    Quantized based “Exploiting security holes in lattice data hiding”,L. Perez-Freire and F. Perez-Gonzalez. IH’07.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Security of video watermarking

    Collusion attack

    Collusion type I occurs when:

    The same watermark is embedded into different copies of differ-ent data.

    Collusion = estimate watermark from each watermarked data(e.g. average individual estimations)

    Hypothesis: The watermark is often considered as noise addition. A simple estimation consequently consists in

    computing the difference between the watermarked data and a low-pass filtered version of it.

    G. Doërr, J.-L. Dugelay, “A guide tour of video watermarking”, Signal Processing: Image Communication 18

    (2003) 263-282.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Security of video watermarking

    Collusion attack

    Collusion type II occurs when:

    Different watermarks are embedded into different copies of thesame data.

    Collusion = suppress watermarks thanks to a linear combination ofthe different watermarked data(e.g. average in order to produce unwatermarked data).

    Hypothesis: Generally, averaging different watermarks converges toward zero.

    G. Doërr, J.-L. Dugelay, “A guide tour of video watermarking”, Signal Processing: Image Communication 18

    (2003) 263-282.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Security of video watermarking

    Collusion attack

    Inter video collusion (not specific to video):Collusion with several videos

    Collusion type I Collusion type II

    Copyright application√

    (same watermark in 6= videos)

    Traitor tracing application√

    ( 6= watermarks in the same videos)

    Intra video collusion (specific to video):collusion with just 1 video

    Collusion type I Collusion type II

    Same watermark in 6= frames of the video

    6= watermarks in each frame of the video

    (and thus in static scenes)

    → main security “danger” is Intra video collusion.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    Security of video watermarking

    Rules fighting against video intra collusion

    if two frames are quite the same,then the embedded watermarks should be highly correlated.

    if two frames are different,the watermarks should be uncorrelated.

    → it is a form of informed watermarking.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    A practical example: the traitor tracing (active fingerprinting)

    Outline

    1 Preamble

    2 H.264

    3 WatermarkingDefinitionsVideo watermarkingSecurity of video watermarkingA practical example: the traitor tracing (active fingerprinting)

    4 Conclusion & Perspectives

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    A practical example: the traitor tracing (active fingerprinting)

    Traitor tracing concept

    VIDEOSELLER

    David John

    Stephen Jennifer

    110101

    010101 010111

    011111

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    A practical example: the traitor tracing (active fingerprinting)

    Example of watermarking for security:traitor tracing application

    An investigation experiment:Z. Shahid, M. Chaumont and W. Puech, “Spread Spectrum-Based Watermarking for Tardos Code-Based Finger-

    printing of H.264/AVC Video”, ICIP’2010, IEEE International Conference on Image Processing, Hong-Kong, China,

    26-29 September, 2010, 4 pages.

    The best probabilistic code (coming from cryptography com-munity): The Tardos code.

    A video watermarking technique inside H.264, before quanti-zation, taking into account RD optimization, robust to photo-metric attacks, and real time.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    A practical example: the traitor tracing (active fingerprinting)

    Example of watermarking for security:Shahid, Chaumont and Puech, ICIP’2010

    IntraCIF 352x288 25 fps92 104 bits

    6 minutes

    100 users maximum20 colluders maximumProbabilty accusing an innocent 10‐3

    User ID (codeword) on 92 104 bits

    10 bits / frame

    Frame

    Macroblocs hiding the same bit

    Spread Spectrum embedding(DCs coefficients modification)

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    A practical example: the traitor tracing (active fingerprinting)

    Collusion attacks

    fk : a video frame from a colluder k.C: the set of colluders.K : the number of colluders.

    fmin = min{fk}k∈C fmax = max{fk}k∈C

    favg =∑

    k∈CfkK

    fmedian = median{fk}k∈C

    fminmax =fmin+fmax

    2 fmodNeg = fmin + fmax − fmedian

    ’bus’, ’city’, ’foreman’, ’football’, ’soccer’, ’harbour’, ’ice’ and ’mobile’, have been con-

    catenated and repeated 4 times.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    A practical example: the traitor tracing (active fingerprinting)

    Detection of the colluders

    No. of colluders detected for attacksK avg min max median minmax modNeg

    2 2 2 2 2 2 25 5 5 5 5 5 58 8 8 8 8 8 611 11 10 10 10 10 714 14 13 13 13 13 917 16 15 16 16 16 1020 18 18 18 19 18 11

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    A practical example: the traitor tracing (active fingerprinting)

    Visual evaluation

    DEMOOriginal videoWatermarked VideoColluded video with 17 colluders (avg attack)Colluded video with 8 colluders (modNeg attack)

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Watermarking

    A practical example: the traitor tracing (active fingerprinting)

    Shahid, Chaumont and Puech, ICIP’2010; remarks

    An interesting practical scheme,

    but the watermarking scheme is not enough secure,

    and the algorithm is not robust to spatial and temporal desyn-chronizations.

    Another interesting approach (outside H.264):F. Xie, T. Furon, C. Fontaine, “On-Off Keying Modulation and Tardos Fingerprinting”, MM & Sec’08, September

    22-23, 2008, Oxford, United Kingdom.

    There is still lots of work...

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Conclusion & Perspectives

    Outline

    1 Preamble

    2 H.264

    3 WatermarkingDefinitionsVideo watermarkingSecurity of video watermarkingA practical example: the traitor tracing (active fingerprinting)

    4 Conclusion & Perspectives

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Conclusion & Perspectives

    Conclusion and perspectives

    lots of possible ways to do watermarking inside H.264 (dependson application)

    If desynchronization (spatial & temporal) robustness is arequirement⇒ Very few algorithms; still an open problem.If security is a requirement (but not desynchronization (spatial& temporal) robustness)⇒ Very few algorithms; still an open problemIf desynchronization (spatial & temporal) robustness &security are requirements⇒ The Graal quest !

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Conclusion & Perspectives

    End

    Slides may be downloaded at: http://www.lirmm.fr/∼chaumont/Publications.html

    e-mail : [email protected]

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Conclusion & Perspectives

    References:

    Spread Spectrum:

    [Cox et al., TIP’1997]

    I. Cox, J. Kilian, F. Leighton, and T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE

    Transactions on Image Processing 6, 1673-1687 (1997).

    DPTC:

    [Miller et al., TIP’2004]

    M.L. Miller, G. J. Doërr and J. Cox, “Applying Informed Coding and Embedding to Design a Robust, High capacity

    Watermark”, IEEE Trans. On Image Processing, 13, 6, 792-807, June 2004.

    Percetpual-QIM:

    [Li and Cox, TIFS’2007]

    Q. Li and I.J. Cox, “Using Perceptual Models to Improve Fidelity and Provide Resistance to Valumetric Scaling

    for Quantization Index Modulation Watermarking”, IEEE Transactions on Information Forensics and Security, 2, 2,

    2007, p. 127-139.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Conclusion & Perspectives

    References:

    Temporal watermarking:

    [Haitsma and Kalker, ICIP’2001]

    Haitsma L., Kalker T., “A Watermarking Scheme for Digital Cinema”, Proceedings of ICIP, vol. 1, Thessaloniki,

    Greece, p. 587-489, octobre 2001.

    [Chen et al., IWDW’2009]

    C. Chen, J. Ni, and J. Huang, “Temporal Statistic Based Video Watermarking Scheme Robust against Geometric

    Attacks and Frame Dropping”, IWDW’2009, Proceedings of the 8th International Workshop on Digital Watermarking,

    Guildford, UK, p. 81-95, 2009.

    3D DFT:

    [Deguillaume et al., SPIE’1999]

    F. Deguillaume, G. Csurka, J. O’Ruanaidh, and T. Pun, “Robust 3D DFT Video Watermarking,” Security and

    Watermarking of Multimedia Contents 3657, 113-124, SPIE’1999.

    On-off keying:

    [Xie et al., MM&Sec2008]

    F. Xie, T. Furon, C. Fontaine, “On-Off Keying Modulation and Tardos Fingerprinting”, MM&Sec’08, September

    22-23, 2008, Oxford, United Kingdom.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Conclusion & Perspectives

    References:

    Luma modification:

    [Golikeri et al., JEI’2008]

    A. Golikeri, P. Nasiopoulos, and Z. Wang, “Robust Digital Video Watermarking Scheme for H.264 Advanced Video

    Coding Standard,” Journal of Electronic Imaging 16(4), 2007.

    Motion vector modification:

    [Zhang et al., SCGIP’2001]

    J. Zhang, J. Li, L. Zhang, ”Video Watermark Technique in Motion Vector”, Proc. of XIV Symposium on Computer

    Graphics and Image Processing, pp.179-182, Oct.2001.

    GOP structure modification:

    [Linnartz and Talstra, ESRCS’1998]

    Linnartz J.-P. M. G., Talstra J., “MPEG PTY-Marks : Cheap Detection of Embedded Copyright Data in DVD-

    Video”, Proceedings of ESORICS, p. 221-240, 1998.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Conclusion & Perspectives

    References:

    [Shahid et al. EUSIPCO’2009]

    Z. Shahid, P. Meuel, M. Chaumont and W. Puech, “Considering the Reconstruction Loop for Watermarking of

    Intra and Inter Frames of H.264/AVC”, EUSIPCO’2009, The 17th European Signal Processing Conference, Glasgow,

    Scotland, 24-28 August, 2009 (an extended version has been submitted to Journal of Electronic Imaging 2010).

    [Noorkami and Mersereau, TIFS’2008]

    M. Noorkami and R. Mersereau, “Digital Video Watermarking in P-Frames With Controlled Video Bit-Rate Increase,”

    IEEE Transactions on Information Forensics and Security, 3, 441-455 (2008).

    [Hartung and Girod, Signal Processing 1998]

    F. Hartung and B. Girod, “Watermarking of uncompressed and compressed video,” Signal Process., vol. 66, no. 3,

    pp. 283-301, May 1998.

    [Gong and Lu, ISM’2008]

    X. Gong and H. Lu., “Towards Fast and Robust Watermarking Scheme for H.264 Video”. In Proc. IEEE International

    Symposium on Multimedia, pages 649-653, 2008.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Conclusion & Perspectives

    References:

    [Mobasseri and Raikar, SPIE’2007]

    B.G. Mobasseri and Y.N. Raikar. “Authentication of H.264 Streams by Direct Watermarking of CAVLC Blocks”. In

    Security, Steganography, and Watermarking of Multimedia Contents IX, SPIE’2007.

    [Zou and Bloom, SPIE’2009]

    D. Zou and J.A. Bloom, “H.264/AVC Substitution Watermarking: A CAVLC Example”, Media Forensics and Security,

    Proc. of SPIE-IS&T Electronic Imaging, SPIE Vol. 7254, 2009.

  • H.264 video watermarking - Marc Chaumont - IPTA’2010

    Conclusion & Perspectives

    References:

    [Bas and Westfeld, MM&Sec’2009]

    “Two Key Estimation Techniques for the Broken-Arrows Watermarking Scheme”, P. Bas and A. Westfeld, 11th

    ACM workshop on Multimedia and Security, MM&Sec’2009, September 07-08, 2009, Princeton, USA.

    [Xie et al., SPIE’2010]

    F. Xie, T. Furon, and C. Fontaine, “Better security levels for ‘Broken Arrows’ ”, , in Proc. IS&T/SPIE Electronic

    Imaging, Media Forensics and Security XII, vol. 7541, San Jose, CA, Jan. 2010.

    [Bas et Doërr, MM&Sec’2008]

    P. Bas and G. Doërr, “Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes”.

    In: 10th ACM workshop on Multimedia and Security, MM&Sec’2008, Oxford, United Kingdom (September 2008)

    227-232.

    [Mathon et al., AT’2009]

    “Comparison of secure spread-spectrum modulations applied to still image watermarking” B. Mathon, P. Bas P, F.

    Cayre F, and B. Macq. Annals of Telecommunication, 2009.

    [Pérez-Freire et Pérez-González, IH’ 2007]

    “Exploiting security holes in lattice data hiding”, L. Perez-Freire, and F. Perez-Gonzalez. In Information Hiding,

    IH’07, Lecture Notes in Computer Science, Saint-Malo, France, 11-13 June 2007. Springer-Verlag.

    PreambleH.264WatermarkingDefinitionsVideo watermarkingSecurity of video watermarkingA practical example: the traitor tracing (active fingerprinting)

    Conclusion & Perspectives